Enhancing security of cloud using static IP techniques
Downloads
Published
DOI:
https://doi.org/10.58414/SCIENTIFICTEMPER.2024.15.1.30Keywords:
Cloud computing, Security mechanism, Authorized user, Internet Protocol (IP), Static IP, Dynamic IP, Cloud Service Provider (CSP).Dimensions Badge
Issue
Section
License
Copyright (c) 2024 The Scientific Temper

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
The user authentication and access control procedures for data stored on a cloud server encountered numerous security risks and concerns. Because critical company data should only be accessible by authorized workers, enhancing cloud security with static IP approaches is more beneficial. Even though the cloud providers maintain many security mechanisms, still the level of security should be raised by them due to lot of intruders who want to break their security mechanism. An encryption method is frequently used in most servers’ security mechanisms. In this security mechanism, data in the cloud server may be stolen and misused. Security mechanisms using static IP addresses are another method for data security in cloud security. This paper explains that the static IP address security mechanism is better and more goal-oriented than that of earlier security systems.Abstract
How to Cite
Downloads
Similar Articles
- Karthik Baburaj, Navaneeth kattil Madathil, Roshini Barkur, NLP Based Voice Assistant Usage on Consumer Shopping , The Scientific Temper: Vol. 16 No. Spl-2 (2025): The Scientific Temper
- S. Kumar, M. Santhanalakshmi , R. Navaneethakrishnan, Content addressable memory for energy efficient computing applications , The Scientific Temper: Vol. 14 No. 02 (2023): The Scientific Temper
- Santhanalakshmi M, Ms Lakshana K, Ms Shahitya G M, Enhanced AES-256 cipher round algorithm for IoT applications , The Scientific Temper: Vol. 14 No. 01 (2023): The Scientific Temper
- Subin M. Varghese, K. Aravinthan, A robust finger detection based sign language recognition using pattern recognition techniques , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- Olivia C. Gold, Jayasimman Lawrence, Ensemble of CatBoost and neural networks with hybrid feature selection for enhanced heart disease prediction , The Scientific Temper: Vol. 15 No. 04 (2024): The Scientific Temper
- Prince Williams, Nilesh M. Patil, Allanki S. Rao, Chandra M. V. S. Akana, K. Soujanya, Aakansha M. Steele, Transformative effects of connectivity technologies on urban infrastructure and services in smart cities , The Scientific Temper: Vol. 14 No. 04 (2023): The Scientific Temper
- Neeraj, Anita Singhrova, A critical review of blockchain-based authentication techniques , The Scientific Temper: Vol. 16 No. 04 (2025): The Scientific Temper
- Deena Merit C K , Haridass M, Analysis of multiple sleeps and N-policy on a M/G/1/K user request queue in 5g networks base station , The Scientific Temper: Vol. 14 No. 02 (2023): The Scientific Temper
- P. Pattunnarajam, Janani G, A. Vijayaraj, Sathiya Priya S, Enhanced routing strategy of wireless sensor network based on fifth generation communication technology , The Scientific Temper: Vol. 14 No. 04 (2023): The Scientific Temper
- M. Deepika, I Antonitte Vinoline, Optimization of an Advanced Integrated Inventory Model Considering Shortages and Deterioration across Varying Demand Functions , The Scientific Temper: Vol. 16 No. 09 (2025): The Scientific Temper
<< < 4 5 6 7 8 9 10 11 12 13 > >>
You may also start an advanced similarity search for this article.
Most read articles by the same author(s)
- J. M. Aslam, K. M. Kumar, Enhancing cloud data security: User-centric approaches and advanced mechanisms , The Scientific Temper: Vol. 15 No. 01 (2024): The Scientific Temper

